• 0 Posts
  • 35 Comments
Joined 2 years ago
cake
Cake day: July 9th, 2023

help-circle



  • I always thought this was an argument for properly racking everything. If it takes more effort, more time to remove, maybe they won’t bother.

    My understanding is that for most individuals, theft is mainly

    1. Targets of opportunity. Lock your door and make sure nothing expensive is visible
    2. Smash and Grab. The goal is to act fast and not care about what you break, so anything harder to smash (without tools) or that causes delay is good.

    I do have outside cameras but they’re not as useful as you’d think. Maybe they have some deterrent value but they’re not going to alert anyone fast enough unless they’re already in the house and you’re not going to identify anyone even if you catch a good shot of their face. If the do catch someone, perhaps the video is enough to say, yep






  • I’m actually planning to do an evaluation of a n ai code review tool to see what it can do. I’m actually somewhat optimistic that it could do this better than it can code

    I really want to sic it on this one junior programmer who doesn’t understand that you can’t just commit ai generated slop and expect it to work. This last code review after over 60 pieces of feedback I gave up on the rest and left it as he needs to understand when ai generated slop needs help

    Ai is usually pretty good at unit tests but it was so bad. Randomly started using a different mocking framework, it actually mocked entire classes and somehow thought that was valid to test them. Wasting tests on non-existent constructors no negative tests, tests without verifying anything. Most of all there were so many compile errors, yet he thought that was fine


  • My company only allows downloads from official sources, verified publishers, signed where we can. This is enforced by only allowing the repo server to download stuff and only from places we’ve configured. In general those go through a process to reduce the chances of problems and mitigate them quickly.

    We also feed everything through a scanner to flag known vulnerabilities, unacceptable licenses

    If it’s fully packaged installable software, we have security guys that take a look at I have no idea what they do and whether it’s an audit

    I’m actually going round in circles with this one developer. He needs an open source package and we already cache it on the repo server in several form factors, from reputable sources …… but he wants to run a random GitHub component which downloads an unsigned tar file from an untrusted source


  • I imagine there’s a significant chunk of users who don’t know or care how to properly open their server up to the world and are relying on the Plex proxies

    That seems like the obvious place to put a subscription that won’t get people upset. Or maybe it’s in the presentation.

    When HomeAssistant started a subscription, they renewed their commitment to opensource, added new remote features with obvious costs under subscription while still letting you do it yourself, plus made it clear this funded continued opensource development. I happily pay this and haven’t been disappointed. Did Plex fumble a similar opportunity?








  • I’m not entirely sure what those movies are like, and don’t want to know, but ……

    My Mom watches horrible Hallmark stuff constantly. As far as I can tell, every movie has the same plot, they are low quality, etc. The thing is they are simple feel good movies for her. She finds them relaxing and gets good feelings from them, perfectly appropriate for “entertainment “.

    If there is any parallel here, my point is that you don’t have to appreciate them for your Mom to. Why does it matter whether you agree with the movies or not: do you love her? Do you want to help her with entertainment that makes her feel good /relaxed/entertained?



  • Yes, you should not be thinking about security in terms of an outside intruder here. Think about untrustworthy or potentially compromised devices.

    • WiFi smart devices are notorious for calling home, possibly collecting data, even if you’re trying to use them locally.
    • There have been botnets from unsecured video cameras, and even some compromised from before import.
    • TVs report back what you’re using them for and when, even playing through hdmi, and some have been caught listening in to your private conversations.

    How do you prevent these from happening, or limit what they can do? One way is to put them on a separate vlan without internet access (your HA or other hub can listen on multiple VLANs and be the gatekeeper) and without access to your computers.

    That being said, for similar requirements, I found managing the more complex network to be too much hassle, and went back to a simple flat network